The focus with ..."of INTEREST"!? is to bring to you as much information, without taking sides, relating to the Subject matter links listed above and herein. You will have to decide! - www.ofINTEREST.net

The United States of America is undergoing CHANGE. Is it for the betterment of all, or just for those who are willing to play along? Why are U.S.A. citizens being driven into poverty, and who are the culprits? You will have to decide! - www.AmericansNotWanted.com

Corruption does Cripples, and affects us all! Don't be silent, and know that there are others who share your thoughts of not accepting Corruption in any form or fashion by anyone - www.CorruptionCripples.com

Scripture, is the manual for those descended from Adam and Eve. There are many versions of Scripture, but are they all with Truth? Abba, Elohiym loves his creations, but lest us not be so bold as to forsake him. You will have to decide, but do so with help from true Scripture, not man's versions thereof! - www.TruthExposedAndRevealed.com

For the first time, BBC filmmakers in the forests of Borneo's Mount Kinabalu have documented the so-repulsive-it's-captivating behavior of a
large, red, worm-guzzling predator as part of their upcoming new series "Wonders of the Monsoon". While the predator remains unclassified by
science, the animal is known to the area's tribespeople, fittingly, as the "Giant Red Leech."

A huge 1m leech has been filmed for the first time swallowing a giant earthworm in the forests of BorneoPhoto: BBC

The Giant
Red Leech is one of the biggest in the world. The specimen captured on
camera was around 30cm long but experts believe they could grow larger.

They
have grown so big that they no longer simply suck blood but now
actively hunt giant blue worms and suck them down like spaghetti. The
worm it is eating is a whopping 78cm.

The new footage shows the leech detecting a worm's trail and following the scent like a sniffer dog.

When it encounters its prey it quickly latches on and moves its lips up and down the iridescent blue body.

"It
was either searching for an end to grab, or was working out whether it
was too big to eat" said documentary director Paul Williams.

"When it found an end it started to suck. It was incredible."

That this ambitious leech is roughly half the length of the worm it's eating only makes the footage more impressive.

A
big thanks to Paul Williams and the Giant Red Leech for this
fascinating footage – and for ruining spaghetti for everyone, forever.

Series producer Paul Bradshaw said: “This is natural history set in the
planet's most glorious and dramatic theatre - the lands of the monsoon.

“It's an incredibly rich mixture of extraordinary creatures, great and small,
with some of the planet’s most colourful and ancient cultures, all bound
together through the story of this rampaging weather system.”

RELATED:

Compare the end-on technique of the Giant Red Leech with the side-bite employed by this Japanese Mountain Leech:

MORE RELATED:

The ant pictured below comes from entomologist, blogger and insect photographer Alex Wild. The remarkable image of a trapjaw ant, torn asunder to reveal
the wriggling, 8-inch parasitic worm living inside. (The ant, by
comparison, measures about half an inch long.)

Infected Ant via Alex Wild

In the jungles of Belize last January,
entomologist Alex Wild noticed something odd about the trap-jaw ants
passing through his outdoor insect photography class: They all had
shrunken heads and swollen abdomens. A day after making the observation,
Wild and his students came upon an ant with a worm bursting out of its
side. Parasites were at work. Nematode worms enter the ants as larvae
and grow inside the ants' body cavity, siphoning off nutrients and
distorting their hosts' natural anatomy. When the eight-inch-long
nematodes are ready to mate a few weeks later, they push their way out
of their half-inch-long hosts, killing them.

INFECTED

In the abdomen of a trap-jaw ant, a parasitic nematode lives off
nutrients from the surrounding fluids and changes the morphology of its
host.

HEALTHY

The jaws of a parasite-free worker can snap shut on prey in just
1/10,000 of a second—the fastest known mechanical action in nature.

Fun fact:
when they're not bursting at the seams with squirming
parasites, trapjaw ants are capable of clamping their mandibles shut
somewhere in the range of 35 to 64 meters per second (~78–145 miles per
hour). The average duration of a trap-jaw clamp is just 0.13
milliseconds, making it among the fastest predatory strikes in the animal kingdom.

Trap-jaw ant, Odontomachus brunneus

In 2006, a team led by UC Berkeley biologist Sheila Patek used high-speed videography to determine that a trap-jaw's mandibles can accelerate at 100,000 times the force of gravity,
and exert a force powerful enough to send its body soaring through the
air in a defensive maneuver known as an "escape jump" (seen above).
Below is another example of a different evasive maneuver (called a "bounce defense jump") with a more horizontal trajectory, from the same study:

This video shows a trap-jaw ant (Odontomachus bauri) that fired its jaws
against a hard surface and launched itself into the air (filmed at 3000
frames per second, played back at 30 frames per second).

Police have
released CCTV images of a University of Virginia student on the night
she disappeared after failing to show up for a party after texting to
say she was lost near her own home.

Authorities
are desperately searching for Hannah Elizabeth Graham who was reported
missing near the Charlottesville campus on Sunday.

The
18-year-old texted her friends at 1.20am on Saturday to say she was
lost on the way to a party near to her home at the Camden Plaza
Apartments but never arrived.

The
same friends told police she had been drinking beforehand and last
night surveillance images were released by police showing her running
inside her apartment block at 9.30pm on the night she went missing.

At the request of the family her address is not being made public.

Last known pictures: Police have released this CCTV footage of Hannah
Elizabeth Graham, 18, on the night she disappeared after failing to show
up for a party

Search: University of Virginia officials have launched a huge hunt for
the missing second year student in nearby woodland. Her parents are from
England and she lives in the US on a Green Card

Search: Hannah was last heard from in the vicinity of 224 14th Street in Charlottesville, just north of the UVA campus

Friends and
family have not heard anything from the second year student, whose
parents are from England, since and police have launched a desperate
search for her in wooded areas.

It shows what she was wearing on the night she disappeared. Police have said she was 'fairly well intoxicated', according to CBS6.

Her
friend, Sophia Lamrissi-Garcia, who was partying with Hannah at one of
her sorority events, told the station she had considered getting a cab
home, but decided she would walk instead.

"At
that point in the night you think you’re doing the right thing walking
alone but it’s not always the right decision to make", Sophia added.

Appeal: Friends and family of the student have asked anyone with any information to call UVA police

Hunt: Police in Charlottesville have announced they are seeking any
information from the public as they search for Hannah Elizabeth Graham

Hannah's parents are originally from the north of England - and she has spent at least two years in the United States

Her neighbor, Sam Blum said that he is devastated and worried about her disappearance.

The
search area for Hannah is being focused around 14th Street Northwest to
Wertland Street, including the railroad tracks, near to the UVA campus.

That was where she sent her last text to friends explaining she was lost.

UVA
President Teresa Sullivan released a statement Monday afternoon saying
the university is both concerned and cooperating fully.

'The
members of the University of Virginia community are united in our deep
concern for a UVa student who is missing and has not been in touch with
her family or friends since early Saturday morning,' said Sullivan
according to the Roanoke Dispatch.

Students who didn't know Hannah said they were worried about what it means for campus security,

"I
think it's real tragic when anything like this happens," said Brannon
Johnson, 4th year at the university to the Roanoke Dispatch.

"It definitely questions everything in terms of safety and how everyone is going to react and move around grounds for sure."

"It kind of hit home that something like this can really happen," said Madison Baril, 1st year at the university.

'Before it was kind of more like stories and warnings, but now it's a real person that's gone.

"If
you are with a group of girls, make sure you leave with a group of
girls," said Baril. 'Find friends don't wander off with people you just
met.'

Hannah, who is not a US citizen is 5'11" with blue eyes and light brown hair. She is said to live off campus

Hannah, who
is not a US citizen is 5'11" with blue eyes and light brown hair. She
lives off campus, is from Northern Virginia and resides in the US using a
Green Card.

"As
some of you may have heard, Hannah Graham is missing. She was last seen
leaving Camden Plaza around 11:50 late Friday night and last heard from
a little after 1am, Saturday," one post shared on Facebook states.

'On
Sunday, her friends and family realized that none of them had seen or
had contact with her since Friday night and a call was placed to the
Emergency Communications Center by her friends, reporting her missing,'
said Lt. Ronnie Roberts, of the Charlottesville Police Department to the
Daily Progress.

"Police
detectives responded immediately and have been working to find Hannah
since learning of her disappearance. A search using a bloodhound was
conducted Sunday evening, but that search did not turn up anything
useful."

Anyone with information is asked to call Charlottesville Police Department at 970-3280 or Crimestoppers at 977-4000.

The Islamic State group has released what it says is the beheading of
British aid worker David Haines - an act described by the British prime
minister as "pure evil". Remember though, both the United States of America top dog & the UK's prime minister both have their heads and keep out of harms way. Slaves pay the price for their mistakes and lies.

The video, released on the internet on late on Saturday, shows
Haines, 44, being killed by in a desert location by a masked man.
Haines, from Perth in Scotland, was abducted last year while working for
the French aid agency Acted.

The US and the UK both seemingly have policies that they DO NOT pay off Terrorist, but in fact, for decades both make use a back-handed way of paying off dangerous, even murderous, criminals, that by any other description, are TERRORIST. This is done for some of the time tested reasons of Profit/Gain and/or Control.

Both men have come forth with declaring retaliation against IS. Sound familiar, but with different players (actors)?

The Department of State, aka State Department, has engaged in quite questionable practices and dealing with KNOWN very dangerous and even TERRORIST connected groups throughout the world. The State Dept. in the Benghazi ordeal intentionally put Americans in harms way all for Profit/ Gain and/or Control. Remember all of the finger pointing, lies, cover-ups and/or DECEPTION? They still refuse to come clean.

With having first had dealings with coming to find out the hard way about Department of State CORRUPTION and the USA's willingness to destroy even it's own citizen, I implore others to not stand down, nor stay complacent with tales, demand TRUTH!

Not to take away and/or express disrespect in any form or fashion with these purported beheadings, but my torture and first hand knowledge of Evil & Corruption at the hands of the USA, forced me on a sojourn that was designed by the State Department, and the Truth is a whole lot more unbelievable than fiction: Documentary-maker Lee Halpin meets death living Homeless in U.K. (Pics/VIDEO)

For me, it's not about conspiracy, it's about Truth. Demand It! DO Not be their fool!

Slaves aren't being told the whole Truth, let alone even a fraction of the Truth.

There is definitely something more taking place behind these purported beheadings.

Perhaps the world should be looking back in history with looking how these wars are brought on. Who, why, what and for WHOM do these actually serve.

What is it that "Islamic State" actually wants?

Are Smoke and Mirrors being used?

What is it that the USA, UK & others might actually seeking to gain?

Demand that even slaves are told the Truth!

Image of David Cawthorne Haines

David Haines with their youngest child, Athea, now age 4

David Haines has a 17-year-old daughter with his first wife Louise, and a
four-year-old daughter with Dragana who described him as a "fantastic
man and father".

The video was released hours after Mr Haines's family made a direct plea
to his captors to contact them. His second wife, Dragana Prodanovic
Haines (pictured with him), previously said she cried for her husband
daily

Home: The garden of the house where Mr Haines lived with his wife and four-year-old daughter in Sisak, Croatia

In the video
titled "A Message to the Allies of America, Alan Henning, a second
British hostage is paraded before the camera with an ultimatum to the
USA & it's allies

'We will hunt them down': David Cameron has vowed justice against
extremists who beheaded British aid worker David Haines and paraded
another, Alan Henning (pictured in a Syrian refugee camp), in a video

The release of the video comes after the purported beheading of Steven Sotloff and James Foley, both American journalists, in a similar manner.

and if you are in a country that isn't blocking this video, give it a look see:

The Islamic State group’s power is focused in Iraq and Syria, but there
are groups far beyond those borders who have aligned themselves with the
armed rebel group. Several small rebel groups in the Philippines have
pledged allegiance to the Islamic State group. Al Jazeera’s Jamela
Alindogan reports from Manila.

“This is an organisation that has an apocalyptic, end-of-days
strategic vision which will eventually have to be defeated,” Gen Martin
Dempsey, chairman of the US Joint Chiefs of Staff, told a Pentagon press
conference in August.

Military action is necessary to halt the spread of the ISIS “cancer,”
said President Obama. Yesterday he called for expanded airstrikes
across Iraq and Syria, and new measures to arm and train Iraqi and
Kurdish ground forces.

“The only way to defeat [IS] is to stand firm and to send a very
straightforward message,” declared Prime Minister Cameron. “A country
like ours will not be cowed by these barbaric killers.”

Missing from the chorus of outrage, however, has been any
acknowledgement of the integral role of covert US and British regional
military intelligence strategy in empowering and even directly
sponsoring the very same virulent Islamist militants in Iraq, Syria and
beyond, that went on to break away from al-Qaeda and form ‘ISIS’, the
Islamic State of Iraq and Syria, or now simply, the Islamic State (IS).

Since 2003, Anglo-American power has secretly and openly
coordinated direct and indirect support for Islamist terrorist groups
linked to al-Qaeda across the Middle East and North Africa. This
ill-conceived patchwork geostrategy is a legacy of the persistent
influence of neoconservative ideology, motivated by longstanding but
often contradictory ambitions to dominate regional oil resources, defend
an expansionist Israel, and in pursuit of these, re-draw the map of the
Middle East.

Summary: Reports are out that a new batch of stolen credit
and debit cards hit the cybercrime underground on Tuesday, with multiple
banks confirming that The Home Depot stores may be the source.

Home Depot Inc. (HD)’s
investigation of a suspected hacker attack is renewing pressure on
retailers and credit-card providers to strengthen payment-system
security. Home Depot spokesperson Paula Drake confirmed that the company is investigating. “I can confirm we are looking into some unusual activity and we are
working with our banking partners and law enforcement to investigate,”
Drake said, reading from a prepared statement. “Protecting our
customers’ information is something we take extremely seriously, and we
are aggressively gathering facts at this point while working to protect
customers. If we confirm that a breach has occurred, we will make sure
customers are notified immediately. Right now, for security reasons, it
would be inappropriate for us to speculate further – but we will provide
further information as soon as possible.”

The largest home-improvement chain said yesterday, 02 Sept. 2014, that it was working with banks and law enforcement
on the possible incursion, following a report by KrebsOnSecurity that a
“massive” batch of stolen credit- and debit-card information was posted
for sale online.

There are signs that the perpetrators of this apparent breach may be
the same group of Russian and Ukrainian hackers responsible for the data
breaches at Target, Sally Beauty and P.F. Chang’s, among others. The banks contacted by Brian Krebs, reporter for KrebsOnSecurity.com, all purchased their customers’ cards from the same underground store – rescator[dot]cc — which on Sept. 2 moved two massive new batches of stolen cards onto the market.

A number of banks are telling Krebs that the breach dates as far back as
April and that all 2,200 Home Depot locations in the U.S. could be
involved. By comparison, there are 1,795 Target locations in the U.S.. That could make a Home Depot breach even bigger
than that of Target, which began in November and was reported in December.

In
that breach, Target said hackers had stolen credit or debit card
information from about 40 million customers. The company also said
criminals had stolen other pieces of personal information, like email
and mailing addresses, from about 70 million people.

The number of customers affected by The Home Depot breaches amounts to more than one-third of the American population.

A recent Kaspersky Lab research examination of two command and control servers used by the Backoff point-of-sale malware
revealed that a U.S.-based Mexican restaurant chain, a North American
freight shipping company and a North American payroll association had
also been breached.

The breaches prompted a warning by the U.S. Secret Service last week warning of a spree of point-of-sale attacks
affecting more than 1,000 businesses. Backoff has experts concerned
because it’s effective in swiping customer credit card data from
businesses using a variety of exfiltration tools, including memory, or
RAM scraping, techniques, keyloggers and injections into running
processes.

A report from US-CERT said attackers use Backoff to steal payment
card information once they’ve breached a remote desktop or
administration application, one that’s using weak or default credentials
that tumble in a brute-force attack.

Hackers then install Backoff on a point of sale device, injecting the
code into a running process in order to scrape credit card numbers from
memory before they’re encrypted on the device.

“The criminals are getting smarter faster than the companies,” said Jaime Katz, an analyst at Morningstar Inc. in Chicago. If the Home Depot breach is on the same scale as Target (TGT)’s incident last year, “there is obviously significant concern,” she said.

Most recently, a group is said to have stolen more than 1.2 billion Internet credentials
— including usernames and passwords — with more than 500 million email
addresses. In that case, however, most of the IDs exploited were used
for sending spam on social networks, rather than illegal spending and
selling on the black market.

The Home Depot also posted a note to shoppers on its website, urging them to monitor their accounts and report any suspicious activity.

Home Depot shares
fell 2 percent to $91.15 on 02 Sept. 2014, marking the largest one-day decline
in almost five months, after the company said it was looking into the
possible breach. It also prompted credit-card companies such as
Citigroup Inc. to step up efforts to protect customers.

In a separate statement Tuesday, 02.09.14, Goodwill said its customers' credit and
debit card numbers had been stolen at more than 300 stores in 19 states
and Washington, D.C. rom February 2013 through Aug. 14. Goodwill blamed
the security lapse on an unidentified contractor's payment processing
system. Reports about fraud linked to shoppers' cards have been "very
limited," Goodwill said.

Home Depot
on Wednesday confirmed a company laptop was stolen that contains
personal information about approximately 10,000 employees of the
do-it-yourself retailing giant.

Several weeks ago, a Home Depot
human-resources representative in Massachusetts took a laptop computer
home to do some additional work and had the PC stolen from his vehicle
parked in front of his house, according to a company official. The
notebook stored personal information, including names, addresses and
Social Security numbers of roughly 10,000 employees, she says. The data
was not encrypted, but the system was password protected, she adds.

Once
Home Depot investigated the theft and determined which employees' data
was stored on the notebook, the company notified potential victims and
is offering one year of credit monitoring for free, the official says.

"We
have no reason to believe the data was the target of this theft," says
the official, adding that the company has received no evidence of
identity theft as a result of the incident.

Home Depot is continuing to work with law enforcement on an investigation into the theft.

Homeland Security tallies damage from breach at USIS, and it's not pretty.

Employees at the Department of Homeland Security may be feeling a bit less secure about their personal data.

On Aug. 2, Department of Homeland Security officials revealed that
the agency's contractor for conducting security clearance background
checks had been hacked, and an unknown number of DHS employees' personal
data from those investigations had been stolen—potentially by a
state-sponsored hacker. Now the DHS has a handle on how many records
were stolen from contractor USIS: at least 25,000.

The Associated Press cites
information from an unnamed DHS official, who spoke with the service
under the condition of anonymity. "Homeland Security will soon begin
notifying employees whose files were compromised and urge them to
monitor their financial accounts," the Associated Press' Joce Sterman
reported.

USIS is, as the Washington Post reported, the largest contract
provider of background investigations to the federal government. The
attack on USIS comes after the March revelation that the US Office of
Personnel Management had been attacked by hackers based in China,
potentially giving them access to the personal information of millions
of government employees—though OPM offficials say that no personal data
appeared to have been taken in the attack before it was detected.

The US Computer Emergency Response Team (US-CERT), which is part of
DHS, is currently investigating the USIS breach, as are the FBI and
other federal authorities. USIS was already under fire from Congress,
and faces a federal whistleblower lawsuit over the alleged "dumping" of
more than 600,000 background checks for security clearances—marking as
complete checks that were only partially conducted. USIS was responsible
for the background checks for Edward Snowden, and for Aron Alexis—the man responsible for the shootings at the Navy Yard in Washington, DC last year.

The estimate of Homeland Security workers affected by the breach at USIS may rise further. (WJLA)

WASHINGTON (AP) - A Homeland Security Department official says a recent
computer breach at a major government security clearance contracting
firm may have affected the internal files of as many as 25,000 of the
agency's workers.

The official says the estimate of Homeland Security
workers affected by the breach at USIS may rise further. The official
spoke on condition of anonymity in order to discuss details of an
incident that is under active federal criminal investigation. Homeland
Security will soon begin notifying employees whose files were
compromised and urge them to monitor their financial accounts, the
official said.

A USIS spokeswoman declined to comment. The company said earlier in a
statement on its website that the cyberattack appeared to "have the
markings of a state-sponsored attack."

Internal network of USIS was compromised by a
cyber attack which has exposed Government Employees’ Data.
Investigators speculate on a state-sponsored attack

The USIS (U.S. Investigations Services), which provides background checks for the US government was recently hacked. This is the second data breach
in a few months that threaten US government. The USIS recently
acknowledged that its network was violated by a cyber attack and experts
that are investigating on the case believe that the authors of the
attack could be a state-sponsored hacking team.

“We are working closely with federal law
enforcement authorities and have retailed an independent computer
forensics investigations firm to determine the precise nature and extent
of any unlawful entry into our network,” “Experts who have reviewed the
facts gathered to date believe it has all the markings of a
state-sponsored attack.” announced the USIS in a statement.

Early July, alleged Chinese hackers hacked the system of the Office of Personnel Management(OPM),
for this reason the USIS is collaborating with the Bureau and
the Department of Homeland Security (DHS) to track the authors of the
attack and to estimate exactly the compromised data and the impact of
the data breach.

Government offices and subcontractors
are privileged targets for cyber criminals and state-sponsored hackers,
last years according to official documents of The U.S. Department of
Energy in different breaches employees’ and contractors’ personal
information was exposed.

The DHS spokesman Peter Boogaard reported to The
Hill that groups of hackers are targeting some agency which maintains
employees’ information, for this reason the DHS is suggesting to the
employees to monitor their financial accounts for suspicious activity
and is alerting them on possible spear phishing attacks that could be
arranged in the next months to steal further data from Government
Offices.

According Boogaard data belonging to some DHS personnel may have been exposed, but at the time I‘m writing there is no news on the number of employee records exposed.

“Our forensic analysis has concluded that
some DHS personnel may have been affected, and DHS has notified its
entire workforce” “We are committed to ensuring our employees’ privacy
and are taking steps to protect it.” Peter Boogaard said.

The journalists at The Washington Post exclude a linked between the cyber attack on USIS and the data breach suffered in March 2014 by OPM.

“The intrusion is not believed to be related to a March incident in which the OPM’s databases were
hacked, said officials, some of whom spoke on the condition of
anonymity because they were not authorized to speak on the record.”
states the Washington Post

It’s clear that such attacks represent a serious threat for the US Government, stolen information could be used by bad actors to organize dangerous attacks to critical infrastructure of the country.

Sen. Tom Carper, chairman of the Homeland Security and Governmental Affairs Committee, declared in a statement that this kind of incidents demonstrates the importance of cyber security in Homeland security.

“This latest report of a cyber attack on
the major government contractor USIS is deeply troubling and underscores
the scary reality of how much of a target our sensitive information has
become in cyberspace,” “It also shows how urgent it is that we reform
our laws to better combat attacks from malicious actors.” he said.

The USIS breach “is very troubling news,”
“Americans’ personal information should always be secure, particularly
when our national security is involved. An incident like this is simply
unacceptable.” added said Sen. Jon Tester (D-Mont.), a Homeland
Security Committee member.

It is necessary to improve security of high
sensitive networks and maximize the information sharing between private
companies and government entities to promptly identify cyber threats
and adopt the necessary mitigation strategy.

The Chinese hacking group that stole 4.5 million patient records
from a Tennessee hospital chain may have gained some bragging rights
from the heist, but they haven't come close to entering the ranks of the
biggest breaches of all time. In fact, they haven't even cracked the
top 10.

The attack
has gained notoriety for its methods, rather than its size — the
hacking group has been prolific in attacking U.S. medical-device
companies and drug makers. The chart below shows how the Chinese breach compares with others.

\

The
ranking provides little solace if you're one of the people whose
personal information was stolen and used for identity theft. Yet, with
security-software maker Symantec calling this the era of the "mega-breach"
and some attacks hitting the nine digits, it's worth remembering that
hackers have many, many other ways to obtain personal information.

MORE:

Who will be the NEXT Target? Those of Poverty?

Mikahel Love,IIO

Inside a warehouse of a thriving non-profit business that uses the poor for business

It seems that businesses such as Home Depot, Target, Albertson's, Target, Michaels, Neiman Marcus, Sally Beauty, P.F. Chang’s China Bistro
and SuperValu, as well as, some preferred banks appear to the targets,
there resides a mountain of personal data including Social Security
numbers, bank account info and even drivers license details held in
insecure and vulnerable so-called non-profits: Food Banks and Food
Pantries.

These
so-called non-profit businesses have been collecting personal details
for some time now. With investigating into how secure those of poverty
details are, we found that security seemed to be brushed off and/or at
most, bare security features were being used.

Although,
one wouldn't think that a person who must go to a Food Bank and/or Food
Pantry for what to eat would have huge amounts of money and/or assets
on hand to steal, there are a multitude of other reasons why identity
theft takes place: elections; travel; committing a crime to implicate
another ...

It appears there exist hardly any security safe-guards in place to protect identity theft of those who MUST surrender personal details to eat: The abused and/or those of poverty in the U.S..

Not
one food pantry expressed any law in place that commanded them to make
clients surrender their personal details as they would when applying for
a loan, government assistance, etc.

Could it be that Food Pantries and Food Banks are a cloaked arm of government?

DO NOT rely upon governments and/or others to safe-guard your personal details. YOU must be vigilant.

Specifically, one such theory
goes, the hacker (or hackers) was able to nail down the iCloud passwords
of the celeb victims and root around in their Apple storage lockers
after gaining access. The responsible party may have used a tool called iBrute, according to The Daily Dot,
which exploited a (since-fixed) iCloud bug that allowed a forced
digital entry by guessing several common passwords until the correct one
unlocked the front door.

It hasn’t been confirmed that iBrute was used; the tool’s creator sees no evidence that it was, but concedes that it’s possible.
iBrute used 500 of the most common passwords that were leaked from a
service called RockYou, which leaked out 32 million usernames and
passwords way back in 2009; the tool’s creators posted those passwords
in a long list on the developer site GitHub.

Listed below are 500 common
passwords below. The passwords that iBrute worked with included one
capital letter and one number, so old standbys like “password” and
“iloveyou” do not appear here.

Even though these passwords are
from 2009, the Great Celebrity Hack of 2014 serves as another reminder
that if you use any of the following 500 passwords on any service, it’s
way past time for a change.

Oh yes, and while you’re at it, you should make sure that you have two-factor authentication enabled on any account that offers it, and make sure you’re using as strong a password as possible. And remember, "Think SMART when developing a PASSWORD!